Atnaujinkite slapukų nuostatas

El. knyga: A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology

  • Formatas: 287 pages
  • Serija: Law, Science and Society
  • Išleidimo metai: 01-Dec-2017
  • Leidėjas: Routledge
  • ISBN-13: 9781351360159
  • Formatas: 287 pages
  • Serija: Law, Science and Society
  • Išleidimo metai: 01-Dec-2017
  • Leidėjas: Routledge
  • ISBN-13: 9781351360159

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

Acknowledgments x
1 Hacking and law
1(12)
Hackers and governance of the networked society
1(1)
Hack
2(3)
Makers
4(1)
Hacktivists
4(1)
Key themes and concepts
5(3)
Common acts of hacking
6(1)
Breaking and making
6(1)
Norms and values
7(1)
Overview of chapters
8(5)
2 Hacker culture
13(52)
History and typology of hacking
13(1)
Of minicomputers and laboratories --- computer scientists and programmers
14(3)
The Hulking Giants
14(1)
The TX-0
15(1)
The PDP-1
16(1)
Of microcomputers, garages and computer clubs --- computer hobbyists
17(9)
The Altair
17(2)
The Homebrew Computer Club
19(1)
The Apple II
20(2)
Blue boxes and paper tapes
22(2)
Free and open versus proprietary and closed
24(2)
Of personal computers, modems and bedrooms --- underground hackers
26(4)
Bulletin Board Systems
26(1)
The digital underground
27(3)
Of free and open source software, licenses and movements --- FOSS developers
30(7)
Free software
30(2)
Copyleft
32(2)
Linux
34(2)
FOSS and other movements
36(1)
Of the world wide web of computers and communities --- hacktivists
37(4)
Hacklabs, hackmeets and hacker cons
37(2)
Taking to the streets and the information superhighways
39(2)
Of open technologies, projects and spaces --- makers
41(7)
Open innovation
41(1)
Hackerspaces
42(3)
Makerbot
45(3)
Makers and hacktivists in context
48(17)
3 Hacker norms and values
65(30)
Norms and values of makers and hacktivists
65(15)
Creativity and innovation
66(1)
Curiosity
67(1)
Individual autonomy and liberty
68(2)
Community development
70(2)
Social development
72(1)
Other prominent norms and values
73(1)
Openness and freedom of access
73(2)
Transparency
75(2)
Security
77(1)
Privacy
78(2)
Hacker manifestos
80(7)
The hacker ethic
81(1)
The conscience of a hacker
82(1)
The GNU manifesto
83(2)
An anonymous manifesto
85(1)
This is the maker manifesto
86(1)
Norms and values in conflict
87(8)
4 Laws on hacking
95(73)
Computer crime laws
95(22)
Brief history and development
95(2)
Computer crime and hacking
97(1)
Illegal access
97(1)
Access or entry without right
97(2)
Objectives and justifications
99(1)
Conflicts with acts, norms and values of hacking
100(3)
Problem of excessive breadth and vagueness
103(1)
Unintended consequences and negative effects
104(1)
Exploitable gaps, loopholes and contradictions
105(1)
Illegal interception
106(1)
Capture data transmissions and emissions
106(1)
Legal and social justification
107(1)
Data interference and system interference
108(1)
Damage or hinder computer data and systems
108(2)
Cyber attacks as a form of system interference
110(1)
Lawful versus unlawful interference
111(5)
Misuse of devices
116(1)
Intellectual property laws
117(14)
Fraught history of intellectual property and socio-technical innovation
117(1)
Intellectual property balance
118(3)
Broad exclusive rights yet narrow limitations and exceptions
121(1)
Reverse engineering, decompilation and use of software
122(2)
Temporary acts of reproduction
124(1)
Private and non-commercial copying and use
125(1)
Scientific research and teaching
126(2)
Repair of equipment
128(1)
Fair use and the three-step test
128(3)
Contract and anti-circumvention laws
131(10)
Contracts
131(1)
Contractual terms and conditions
131(1)
Freedom and restraints of contract
132(1)
Contracts and computer crime
133(2)
Anti-circumvention rules
135(1)
Technological protection measures
135(3)
Techno-legal barriers
138(3)
Conflicts and correspondences between hacking and law
141(27)
5 Hacking's interactions with law
168(39)
Perceptions and attitudes of hackers toward law and authority
168(11)
Problem with authority
168(2)
Trouble with the law
170(3)
Legal and extra-legal means
173(2)
Presence rather than the absence of law
175(1)
Know the law more
176(2)
Greater access to law and legal assistance
178(1)
Hackers' responses to law
179(17)
Ignore and avoid
180(1)
Change and resist
181(1)
Legal change through hacking
181(2)
Hacking electronic voting computers
183(3)
Leaktober
186(1)
Hacking the OV-chipcard
187(4)
Work with, use and adapt
191(1)
Net neutrality rules
191(3)
Open source projects
194(2)
Complex relations and reactions
196(11)
6 Normative conclusions and areas of law reform
207(40)
Normative implications
207(2)
Hackers as technical, social and legal actors
207(1)
Resolving conflicts by building on commonalities
208(1)
Support and reach out to hackers
209(11)
Responsible disclosure
209(1)
Responsible disclosure rules
209(3)
Hackers' reactions
212(2)
Changing attitudes, changing laws
214(2)
Open data
216(1)
Policies and initiatives
216(1)
Hackathons
217(3)
Change and improve the law
220(15)
Computer crime laws
220(1)
Hacking as a legitimate and common activity
220(1)
Essential requirement of criminal intent
221(3)
Intellectual property laws
224(1)
Three-step test as akin to fair use
224(3)
Three-step test plus
227(2)
Anti-circumvention and contract laws
229(1)
More limitations and exceptions to anti-circumvention
229(1)
Necessary nexus between circumvention and copyright infringement
230(2)
No contractual waivers of limitations and exceptions
232(1)
Rights of users
233(2)
Hacking can be change for good
235(12)
Appendix: research methods 247(3)
Bibliography 250(23)
Index 273
Michael Anthony C. Dizon is a Lecturer in Law at the University of Waikato, New Zealand. He previously worked as an information and communications technology lawyer and researcher for institutions and organisations in the Netherlands, the United Kingdom, and the Philippines.