| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.

View
 

Hactivism

Page history last edited by David Shutkin 8 years, 1 month ago

 

Since 2010, the release of hundreds of thousands of classified U.S. government documents by Wikileaks brought hacktivism to the attention of the world. There are forms of hacktivism that damage computer networks and are waged for financial gain and there are forms of hacktivism advocating for political or social change. Laws in the United States generally prohibit hacktivism. However, there are laws that protect free speech and the right to protest.  Should expressive forms of hacktivism that resemble conventional forms of protest be protected from anti-hacking laws? Post your response to your blog (400+ incredibly thoughtful words, about 6 paragraphs)

 

1. A Weapon We Can’t Control

The New York Times June 24, 2012 By MISHA GLENNY

 

2. Obama Order Sped Up Wave of Cyberattacks Against Iran

The New York Times: June 1, 2012 By DAVID E. SANGER
 

3. Graphic multimedia:  How a Secret Cyberwar Program Worked

 

4. Hampson, N. (2012). Hacktivism: a new breed of protest in a networked world. Boston College International & Comparative Law Review, 35(2), 511-542.

 

5. Jamil, D.  & Khan, M. (2011). Is ethical hacking ethical? International Journal of Engineering Science & Technology3(5), 3758-3763.

 

6. Kushner, D. (2012). MACHINE POLITICS. New Yorker88(12), 24-30.

 

7. Murphy, S. (2011). Agents provocateurs.New Scientist211(2829), 46-49.

 

8. Internet Freedom Coalition

 

 

 

 

Comments (0)

You don't have permission to comment on this page.