Hacktivism Social Informatics Chris Mahon 3037266.
-
Upload
eustacia-griffith -
Category
Documents
-
view
219 -
download
2
Transcript of Hacktivism Social Informatics Chris Mahon 3037266.
![Page 1: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/1.jpg)
HacktivismSocial InformaticsChris Mahon 3037266
![Page 2: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/2.jpg)
Introduction
Hacking + Activism = HacktivismUse of computer or internet
networks to express an opinion of protest
Aims to bring about change
Examples:Hacking (or Cracking)DDoS
![Page 3: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/3.jpg)
Methodology
Literature ReviewQualitative Research
Analysing motivations of those parties involved in Hacktivism cases
![Page 4: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/4.jpg)
Framework
Social Construction of Technology (SCOT)
![Page 5: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/5.jpg)
Examples
Hackers vs. Steven Conroy◦Proposal of Internet Filter back in
2008◦Hoped to gain media attention to
protest censorship“Leto” on SBS Insight
◦No real hacking ability, but empowered people with free-flow of information via social media
![Page 6: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/6.jpg)
Findings
Rights & Free SpeechDifficulty of Policing the InternetMotivations of Hacktivists
![Page 7: Hacktivism Social Informatics Chris Mahon 3037266.](https://reader036.fdocuments.us/reader036/viewer/2022082516/56649d215503460f949f64bb/html5/thumbnails/7.jpg)
References Shorter, C. (2000), “Understanding Activism: A holistic look at activism, and
activist techniques”, Cameron Shorter.net, viewed online 8/11/2011 <http://cameron.shorter.net/writings/activism.html>
“Definition of white hat hacker” (n.d.), PC Magazine, viewed online 8/11/2011 <http://www.pcmag.com/encyclopedia_term/0,2542,t=white+hat+hacker
> SearchSecurity.com (2001), “What is black hat?”, TechTarget, viewed online
8/11/2011 <http://searchsecurity.techtarget.com/definition/black-hat > “What is qualitative research?” (n.d.), QSR International, DTDigital, viewed
online 8/11/2011 <http://www.qsrinternational.com/what-is-qualitative-research.aspx>
Moses, A. (2009), “Internet Censorship plan gets the green light”, The Sunday Morning Herald, viewed online 8/11/2011 <http://www.smh.com.au/technology/technology-news/internet-censorship-plan-gets-the-green-light-20091215-ktzc.html>
Whyte, S. (2011) “Meet the hacktivist who tried to take down the government”, The Sydney Morning Herald, viewed online 9/11/2011 <http://www.smh.com.au/technology/security/meet-the-hacktivist-who-tried-to-take-down-the-government-20110314-1btkt.html>
“Hacktivism” (2011), Insight, Television transcript, first aired on SBS on 27/9/2011, retrieved online 9/11/2011 <http://www.sbs.com.au/insight/episode/index/id/431/Hacktivism#transcript>